C:\昇泰安\龙宇\工作室\解压源码\便压安装脚本2014\SetupApp\bin\SetupApp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-25_6150b80995f07e55890bc0afc7202ef5_mafia.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-25_6150b80995f07e55890bc0afc7202ef5_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-25_6150b80995f07e55890bc0afc7202ef5_mafia
-
Size
682KB
-
MD5
6150b80995f07e55890bc0afc7202ef5
-
SHA1
4c02ca321e56f8e1086ff6b373b7008347eac2f7
-
SHA256
8f860ffe2fa4e2968dae87150fb8de98462e560303b3094127ddd00e3fb97d12
-
SHA512
47a78dd1a7aaa2ada66cef5c8f39a5ae2b39fd04df6060e8a7ffd897d133cbeed60a05547c152371a1af7c8ffea85be9d5b410d24bfa904d6ff43b309cdeff6b
-
SSDEEP
12288:djmPHmwJEoYU0remQxZj2R8/R1gYVRnxmgTsEP1Hx:hmPHmWeU0rrQWO/gWxUc1Hx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-25_6150b80995f07e55890bc0afc7202ef5_mafia
Files
-
2024-08-25_6150b80995f07e55890bc0afc7202ef5_mafia.exe windows:5 windows x86 arch:x86
e6783af50d94b854ff1b20d5148d7fb3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WritePrivateProfileStringA
DeviceIoControl
GetVersionExA
GetEnvironmentVariableA
FindFirstFileA
FindNextFileA
DeleteFileA
GetFileAttributesA
OutputDebugStringA
WinExec
lstrlenA
DosDateTimeToFileTime
SetFilePointer
SystemTimeToFileTime
SetFileTime
ReadFile
GetFileType
GetCurrentDirectoryW
GetFullPathNameA
GetDriveTypeW
IsDBCSLeadByteEx
GetProcessHeap
SetEndOfFile
GetVolumeInformationA
WriteConsoleW
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
GetStringTypeW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetHandleCount
IsValidCodePage
GetOEMCP
LoadLibraryW
InitializeCriticalSectionAndSpinCount
HeapCreate
IsProcessorFeaturePresent
GetLocaleInfoW
CreateMutexA
GetLastError
WriteFile
CreateFileA
GetACP
WideCharToMultiByte
MultiByteToWideChar
GetTempPathA
LockResource
SizeofResource
LoadResource
FreeResource
FindResourceA
Sleep
TerminateThread
CloseHandle
GetModuleHandleA
GetModuleFileNameA
GetLocalTime
GetPrivateProfileStringA
SetFileAttributesA
CreateDirectoryA
TerminateProcess
OpenProcess
GetCurrentProcess
CreateFileW
GetModuleFileNameW
GetStdHandle
SetLastError
TlsFree
TlsSetValue
TlsGetValue
InterlockedIncrement
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringW
RtlUnwind
GetCPInfo
RaiseException
GetStartupInfoW
HeapSetInformation
GetCommandLineA
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleW
GetProcAddress
HeapFree
CreateThread
GetCurrentThreadId
ExitThread
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DecodePointer
EncodePointer
InterlockedExchange
InterlockedDecrement
user32
IsDlgButtonChecked
ShowWindow
SetWindowPos
GetDlgItem
DispatchMessageA
MessageBoxA
TranslateMessage
BeginPaint
SendMessageA
GetClientRect
LoadIconA
SendDlgItemMessageA
PostQuitMessage
CreateDialogParamA
GetMessageA
DestroyWindow
SetDlgItemTextA
EndPaint
GetSystemMetrics
LoadImageA
EnableWindow
GetDlgItemTextA
CreateWindowExA
PostMessageA
wvsprintfA
gdi32
CreateFontA
advapi32
OpenProcessToken
OpenSCManagerA
StartServiceA
CreateServiceA
CloseServiceHandle
RegCloseKey
AdjustTokenPrivileges
RegOpenKeyExA
RegCreateKeyExA
LookupPrivilegeValueA
RegQueryValueExA
RegSetValueExA
shell32
SHCreateDirectoryExA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
Shell_NotifyIconA
ole32
CoCreateInstance
CoInitialize
CoTaskMemFree
gdiplus
GdipDeleteFontFamily
GdipCreateSolidFill
GdipCreateFont
GdipDrawString
GdipDeleteGraphics
GdipCreateFromHDC
GdipFillRectangleI
GdipDrawLineI
GdipCreatePen1
GdiplusStartup
GdipDeleteFont
GdipDeletePen
GdipDeleteBrush
GdipCreateFontFamilyFromName
shlwapi
PathIsDirectoryA
PathFileExistsA
UrlGetPartA
PathCombineA
PathStripPathA
PathIsURLA
PathRemoveBackslashA
netapi32
Netbios
psapi
GetModuleFileNameExA
EnumProcessModules
EnumProcesses
wininet
HttpQueryInfoA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
iphlpapi
GetAdaptersInfo
Sections
.text Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ